Deploying an IPv4-IPv6 Dual Stack Network in an Academic Computing Infrastructure

Size: px
Start display at page:

Download "Deploying an IPv4-IPv6 Dual Stack Network in an Academic Computing Infrastructure"

Transcription

1 Deploying an IPv4-IPv6 Dual Stack Network in an Academic Computing Infrastructure Shaun M. Lynch, Ph.D. Department of Mathematics and Computer Science University of Wisconsin-Superior Superior, WI Abstract Adoption of IPv6 has been an agonizingly slow process even though IPv4 address exhaustion constrains deployment in a time of expanding network utilization. Academics and academic programs charged to educate and train the next generation of technology professionals are acutely aware of the challenges associated with introducing new technologies into existing curriculums. IPv6 technology is one of those areas that students in technology related curriculums will need to understand going forward. In this light, the author pursued a plan to transition the computing infrastructure of the Department of Mathematics and Computer Science at the University of Wisconsin- Superior to a full-fledged IPv4-IPv6 dual-stack network. The goal was to create a network that was not only functional but capable of providing faculty and students with the tools necessary to learn and explore IPv6 technologies. This paper presents the design, technologies, and processes used to achieve this goal.

2 1 Introduction The adoption of IPv6 in many regards has been an agonizingly slow process. At the start of 2015, IPv6 connectivity remains in single digits as a percentage of overall network traffic despite being available since the turn of the millennium. However, IPv4 address exhaustion is an irrefutable constraint that limits the deployment in a time of expanding network utilization due to increased use and deployment of mobile technologies and the potential explosion of connected devices and embedded systems stimulated by the Internet of Things (IoT) movement [1, 2, 3]. Academics and academic programs charged to educate and train the next generation of technology professionals are acutely aware of the challenges associated with introducing new technologies into existing curriculums. Adding new content to a curriculum generally means reducing content elsewhere. Faculty and academic programs take a calculated risk by changing programs to provide students with the skills they will need to adapt to a volatile technology landscape upon graduation. Nonetheless, maintaining curriculum so that it contains material relevant to student success is a necessary activity and requires the appropriate tools and technologies to that subject matter can be taught effectively. IPv6 technology is one of those areas that students in technology related curriculums will need to understand going forward. Although adoption has been slow, there are no other technologies on the horizon to satisfy networking challenges expected in the future. In this light, the author pursued a plan to transition the computing infrastructure of the Department of Mathematics and Computer Science at the University of Wisconsin- Superior to a full-fledged IPv4-IPv6 dual-stack network. The goal was to create a network that was not only functional but capable of providing faculty and students with the tools necessary to learn and explore IPv6 technologies thus providing a mechanism to extend textbook concepts to the world of practice. This paper presents the design, technologies, and processes used to achieve this goal. Discussion begins with a brief background that includes motivation for the project, computing environment, and academic value of incorporating IPv6 technology. Next, design considerations including connectivity, perimeter control, and address management are explored. Emphasis is place on viable alternatives suited to an academic setting. This is followed by an in-depth look at the deployment process where the current architecture, implementation, and system migration are presented. Particular attention is paid to the factors that influenced the selection of design alternatives. Finally, the paper closes with comments and observation about the process. 2 Background Transitioning to IPv6 is a nontrivial challenge since academic computing infrastructures often reside within a larger campus network and must coexist without disrupting ongoing operating activities of the university. University technology operations generally

3 emphasize production and sustainability needed to serve the entire university community. Their operations are subject to a wide range of policy and regulatory issues that must be complied with. Academic departments on the other hand, must equip students with knowledge and skills they will need in the future requiring a vision that looks toward the horizon. In addition, academic operations are free from many of the policy and regulatory issues enabling an environment where innovation can occur. Regardless, the challenge is being able to respect differences and make these two systems work together. 2.1 Motivation The decision to deploy an IPv4-IPv6 dual-stack network infrastructure was driven by two motivating factors. First, implementation enables faculty and staff to gain in-depth familiarity with IPv6 networking technologies and work through the challenge of deploying a dual-stack network. It is through implementation that educators begin to understand the nuances and caveats of the technology and develop the deep-reasoned knowledge necessary to teach subject matter and guide students through the learning process. It also serves to stimulate new ideas and approaches to communicate the concepts to those engaged in the subject matter for the first time. The second motivating factor is to create an IPv6 infrastructure that provides students with the ability to practice textbook concepts using actual hands-on projects. It is the author s experience that teaching from a book is easy. Creating meaningful projects that engage student interests and provides a physical outlet that reinforces learned concepts is hard. This process is made even more difficult in a resource constrained environment where the latest technology is often out of reach and beyond the budget of most academic institutions. 2.2 Academic Computing Environment The department manages and maintains a dedicated computing environment used to advance the department s teaching mission. Computing resources are used extensively in classes across academic programs ranging from entry level coursework that fulfills the University s mathematics general education requirement to advanced electives that meet curricular objectives. Students, faculty, and academic staff enjoy a wide array of applications suited for general productivity, programming, software development, analytic modeling, device emulation, network security, multimedia, and web authoring. Two advanced computing laboratories are the most visible aspect of the department s computing environment. Each advanced computing lab contains 25 computers with one set aside as a teacher workstation that drives the rooms projection and multimedia system. All workstations share a common configuration based on a core image containing Windows 7 x64 Enterprise as the operating system along with a productivity suite, integrated development tools, and a variety of utility applications. Specialty applications

4 are licensed and installed on all computers within a given lab to ensure consistency and allow full utilization of lab workstations. The department also maintains a sandbox for special projects, experimentation, prototyping, and demonstration that includes a variety of legacy computers, one-of-a-kind systems, components, networking gear, and mobile racks. The sandbox provides a setting where students and faculty can explore without tying up shared resources needed for instruction or disrupting the production systems. The server and network resources are the cornerstone of the department s computing environment and provide essential services to host applications, manage computing assets, and deploy security policies. The physical system consists of physical servers that host domain and internet protocol management services, a two node cluster along with an iscsi storage array that provides a virtualization platform for a variety of application servers, a dedicated server that hosts virtual desktops, and other specialty servers that provide shared storage. 2.3 Academic Value There is little argument that IPv6 is primarily a technical solution aimed to expand network capabilities beyond those currently provided by IPv4. Few people consider how their browsers works or how their mobile device allows people to connect, the technology just works. The value brought by enabling IPv6 technologies in an academic program is that it exposes what is hidden, transparent, and often taken for granted to students pursuing technology related curriculums. An IPv6 enabled network offers the ability to demonstrate a wide array of technologies that simply would be out of reach using an IPv4 only network. A partial list includes: Transitional mechanisms such as 6in4, 6rd, NAT64, and DNS64 IPv6 addressing such as link-local, unique local, and global addresses IPv6 address formats such as unicast and multicast Private network architectures using non-routable addresses Address management mechanisms such as router advertising and DHCPv6 Stateless and stateful auto configuration Network protocols such ICMPv6 In combination with desktop virtualization, devices can be built using open source and proprietary operating systems and applications allowing students to directly interact with IPv6 technologies. 3 Design Considerations Prior to deploying IPv6 in a dual-stack configuration, it is important to weigh options and the evaluate the tradeoff they may incur. Fortunately, academic computing environments

5 emphasize innovation over production thus tend to be more flexible in the technologies deployed. Based on the author s experience, the most important options to consider before deploying IPv6 in an academic computing infrastructure include: How to secure an IPv6 connection, How to manage the IPv6 connection at the network perimeter, and How to manage and assign IPv6 addresses within the department s intranet Design alternatives are not necessarily mutually exclusive; therefore, multiple options may be available. In some cases, it is possible to create network enclaves within the academic infrastructure to test various configurations before deployment. 3.1 IPv6 Connectivity The simplest way to attain an IPv6 connection is to use an address space provided by the host institution or internet service provider. If the host organization has not moved to an IPv6 infrastructure, then the host s perimeter and intermediate networking devices may need to be configured to allow and route IPv6 traffic to the local network. However, this approach may not always be possible and depends on the organization s network policies, intervening network configuration, and relationship with network administrators. In the absence of a native IPv6 connection, IPv6 transitional technologies are available that can provide connectivity over existing IPv4 only networks. IPv6 transitional technologies work by tunneling IPv6 traffic between endpoints that span an IPv4 network. 6rd and 6in4 are the two most common protocols suitable for a dualstack network. 6rd is a derivative of 6to4 (recommended for deprecation by IETF [4]) and may be offered as an optional service to ISP subscribers. In this particular scheme, the ISP operates a 6rd border relay using its own IPv6 network prefix to provide remote endpoint services. Most residential customers receive an IPv6 address with a 64 network prefix; however, non-residential service may receive an address that allows up to a 16 bit (and possibly more) subnet range. On the other hand, 6in4 offers IPv6 connectivity without need for dedicated ISP services. Instead, an independent tunnel broker provides a remote endpoint and an IPv6 address space to the subscriber. Hurricane Electric and SixXS are two popular 6in4 tunnel brokers in the United States and provide free services to individuals experimenting with and organizations making the transition to an IPv6 infrastructure. Both service providers offer IPv6 addresses with 64 and 48 bit network prefixes. Fortunately, IPv6 connectivity options are not mutually exclusive alternatives. Since IPv6 transitional technologies employ a virtual private network to tunnel IPv6 traffic over IPv4 networks, they can be used concurrently with native IPv6. In fact, multiple transitional technologies can be used simultaneously provided network resources are available. This feature provides considerable flexibility to academic departments and creates the ability to provide enclaves of IPv6 connectivity within an overarching IPv4-IPv6 dual-stack network infrastructure.

6 3.2 Perimeter Gateway Manufactures of commercial and consumer grade routing and firewall equipment often include native and transitional IPv6 capabilities that provide gateway services for a local network. It is important to note that not all devices are IPv6 capable or support IPv6 services to the same level as traditional IPv4; therefore, it is important to review device specifications before purchasing a dedicated appliance. In some instances, enthusiasts can upgrade IPv4 consumer grade routers with new firmware such as OpenWRT, DD-WRT, or Tomato to provide native IPv6, 6rd, and 6in4 capabilities. However, this approach can be risky in that flashing unsupported firmware often voids warrantees and may lead to an irrecoverable failure. Nonetheless, this is a viable alternative for student and faculty interested in building a home lab or small setups that need IPv6 connectivity. Alternatively, do-it-yourself network administrators can build an IPv6 gateway device from the scratch using an old computer or virtual machine. There are a number of fullfeatured, web-enabled applications built upon open source operating systems can be used such as pfsense, M0n0, Untangle, Vyatta, and more. In addition, an IPv6 gateway can be built directly from open source and proprietary operating systems allowing designers to pick and choose specific applications and features. This enables the ability to create highly customized systems tailored for specific tasks. Most gateways are built using a dual-homed platform that allows traffic to be managed between public and private networks. Dedicated routing and firewall applications generally require a minimum of two network adapters particularly if network address translation (NAT) is being employed for IPv4 to amplify the address space. However, there may be instances where an IPv4 only gateway on the perimeter cannot be replaced with a device that supports IPv6 native and transitional technologies. In this situation, it is possible to create a single-homed, intranet residing IPv4-IPv6 gateway that compliments the functionality of the IPv4 perimeter device. A single-homed, intranet residing IPv4-IPv6 gateway takes advantage of the ability of the network interface to support both IPv4 and IPv6 protocols independently. This dual-stack capability makes a single network adapter appear as if it were two separate devices each supporting a distinct protocol. A virtual network interface using simple internet transition (SIT) provides connectivity and allows the gateway to manage traffic between IPv4 and IPv6 protocols. Therefore, all private intranet IPv6 traffic tunnels through the IPv4 network to the remote endpoint connected to the public IPv6 internet. The biggest downside to this approach is that it requires customized low-level network settings of an operating system to achieve the desired functionality. Firewall settings for an IPv6 enabled gateway are very similar to those used in IPv4 with the notable exception of ICMPv6. ICMPv6 extends the functionality of ICMPv4; however, certain ICMPv6 packets such as error messages must be allowed through the firewall for IPv6 to function properly. In addition, it is essential that encapsulated

7 IPv6 (Protocol 41) be allowed on the IPv4 network interface if the gateway is using the 6in4 transitional technology. 3.3 Address Management Router advertisement serves as the primary mechanism to configure IP addresses in an IPv6 infrastructure. Routers multicast ICMP router discovery messages to host devices that include the router s address (default gateway) along with various flags that indicate how the host s network interface should be configured. There are several options that range from stateless auto-configuration to stateful configuration using DHCPv6. The most common configurations include: Stateless Router provides network prefix enabling host to auto-configure network interface address Stateless with Recursive DNS Router provides network prefix enabling host to auto-configure network interface address and name server addresses (Note: Not all operating systems respond equally to this configuration) DHCPv6 Stateless Router provides network prefix enabling host to autoconfigure network interface address while DHCPv6 provides name server addresses and other options DHCPv6 Stateful DHCPv6 assigns host address, name server address, and other options Dynamic address assignment in an IPv6 environment is managed using DHCPv6. Although there similarities with DHCPv4, DHCPv6 is distinct protocol and has significant differences from its predecessor (i.e. available options, multicasting instead of broadcasting, ports used, unique identifiers, et cetera). Nonetheless, it should be recognized that DHCPv6 only augments the functionality of the advertising service provided by the router and not a replacement. Domain name services in an IPv6 environment are nearly identical as those found in IPv4 infrastructure. Only when naming a reverse lookup zone is a difference is observed. The naming convention for an IPv6 reverse lookup zone uses a reverse-ordered, periodexpanded, hexadecimal byte form followed by suffix ipv6.arpa. 4 Deployment Fortunately for computing infrastructure administrators, deploying an IPv4-IPv6 dualstack network is an incremental process that builds upon an existing IPv4 architecture. However, it is important to ensure the underlying system is sound before superimposing a new IPv6 layer. Guiding principles the author used during this process include: Partition the network into manageable zones based on physical or logical boundaries Articulate incoming and outgoing traffic patterns for each zone

8 Ensure network zones are aligned with logical structures and policy frameworks (e.g. Active Directory and group policy) Hide and protect internal assets using appropriate technology and configurations Expose only what you have to and cordoned off those systems with a well-defined interface Smaller is generally more manageable than bigger Model and prototype offline before implementing Automate where appropriate Be consistent Use the principle of low-hanging fruit start with the easiest and work up to the most difficult Deploy, test, repeat Most importantly, implement better solutions as they become available! It is likely that design flaws, deficiencies, and inconstancies will be discovered as the new technology is implemented and comes online. 4.1 Current Architecture The department s computing infrastructure consists of a core server infrastructure, two advanced computing laboratories, hardware lab and technical support workstations, and sandbox systems. The server infrastructure hosts eight physical servers, 16 virtual servers, iscsi storage array, and network attached storage. The two advanced computing lab each contain 24 workstations and one teacher workstation. In addition, approximately a dozen workstations are distributed between the hardware lab, technical support, and sandbox systems. These systems reside on a private network established by the University s network administrator. The department s network perimeter is controlled by a Cisco ASA 5505 that provides IPv4 NAT services to the department s intranet. The gateway lies behind the University s perimeter firewall and has access to other campus computing resources. Configuration and management of the gateway is the sole responsibility of the campus network administrator to ensure compliance with University network policies. All department systems share an eight-bit IPv4 host address space that provides 254 usable addresses. The address space is partitioned into regions to simplify management. A portion is allocated for networking infrastructure appliances and servers that use static addresses. A dynamic portion using reserved addresses is set aside for workstations in the advanced computing lab and networked printers to ensure connectivity. The remaining address space is made available for temporary connections made by user devices, virtual machine instances hosted on local workstations, and sandbox systems.

9 4.2 Implementation To begin the process, the author met with the University s network administrator to explore available options to bring IPv6 connectivity to the department s private network. At the time, native IPv6 was not available and adopting the protocol was not being considered in the near future by the University s networking staff. This left the options of using a different ISP or a tunnel broker service to provide IPv6 connectivity. Further research revealed that the current gateway device used for the department s perimeter did not have the necessary settings to create a local 6in4 tunnel endpoint potentially eliminating the option to use a tunnel broker. The author continued to investigate various solutions and found a series of commands that would enable the gateway to pass encapsulated IPv6 traffic to a selected device residing on the private network interface. This option was well received since it allowed for continued use of the gateway along with existing settings. After working with the University s network administrator and overcoming a few technical challenges, the author opted to provide IPv6 connectivity using a tunnel broker service. Securing a tunnel broker service was the next step in the process. Hurricane Electric and SixXS offer free tunnel broker services that would adequately meet the academic needs of the department. The author selected Hurricane Electric as the service provider for the following reasons: 1) familiarity and prior use of the service, 2) simple registration process with quick turnaround, 3) numerous configuration examples, and 4) provisions for both 64 and 48 bit network prefixes suitable for creating subnets. The next decision revolved around whether to use a virtual machine or physical computer to host the IPv4-IPv6 gateway. In this case, the author opted to deploy the system on a physical computer for two reasons: First, installing and configuring an operating system on actual hardware allows drivers to interact with and fully utilize available hardware. This impacts both performance and the ability to troubleshoot problems should they arise. Second, isolating a prototype system with an untested configuration allows the system to be physically quarantined if needed. This is particularly important when working with a public-facing network appliance subject to wilds of the internet. Choosing an address management scheme for the dual-stack infrastructure was the final step, however, inherent differences between IPv4 and IPv6 addressing schemes forced several tradeoffs. To begin with, the original network design placed all computing assets on a single segment behind a gateway using NAT. Therefore, all hosts are assigned a private IPv4 address that should not be routable beyond the network perimeter. However, the IPv6 address range serviced by the gateway is globally routable. Ideally, the network should be partitioned into public and private zones where globally routable and unique local addresses can be applied. Despite this limitation, the author decided to maintain a single network prefix and block access to hosts within the perimeter using firewall rules. Another complicating factor is that the department s academic network supports both provisioned and ad hoc dynamic connections. For instance, advanced computing lab workstations must have network connectivity during class periods. Conversely,

10 temporary connections such as laptops or locally created virtual machines compete for a limited pool of IPv4 addresses. The reservation and leasing system in DHCPv4 provides an effective mechanism to track and prioritize network connectivity. Therefore, the author decided to align the IPv6 address management mechanism to the existing IPv4 address management scheme as closely as possible. These conditions led a tiered address management scheme based on system type. The principal schemes include: Server Infrastructure Static host, name server, and default gateway addresses using global IPv6 addresses; host automatically registers address to DNS server when available otherwise host address is manually registered with DNS. Advanced Computing Lab Workstations and Printers Stateful using DHCPv6 to assign host and name server addresses using global IPv6 address; individual host addresses are reserved in DHCPv6; default gateway assigned link local address of IPv4-IPv6 gateway; DHCPv6 registers host address with DNS. Temporary Connections Stateful using DHCPv6 to assign host and name server addresses using global IPv6 address; default gateway assigned link local address of IPv4-IPv6 gateway; DHCPv6 registers host address with DNS. Where possible, a symbolic representation of IPv4 host identifier was used for the IPv6 host identifier. For example, a server with the IPv4 address /24 ( /24 network prefix and 25-decimal host identifier) would have an IPv6 address of 2001:db8::25 (2001:db8::/64 network prefix and 25-hexadecimal host identifier). This approach greatly simplifies host identification whether an IPv4 or IPv6 address is being referenced. 4.3 Migrating Systems to IPv6 Fortunately, all networked devices and operating systems in the department s computing infrastructure were IPv4-IPv6 dual-stack enabled. This greatly simplified the migration process once the mechanisms used to manage IPv6 addresses were deployed. However, a couple of post deployment issue emerged that escaped immediate detection. Shortly after the deployment, the author observed inconsistencies in DNS registration. Specifically, a device would only register either the assigned IPv4 or IPv6 address, but not both. The problem occurred intermittently, was not associated to any particular device, and happened only on systems assigned addresses by DHCP. The problem was eventually traced to a setting in DHCPv4 that forced a DNS update on older client systems that do not support name mapping (Client FQDN, Option 81) [5, 6]. The setting created a timing problem that conflicted with the dynamic DNS update setting in DHCPv6. Unselecting the option and using the default dynamic DNS update settings in both DHCPv4 and DHCPv6 resolved the issue. In another incident, the author was preparing to upgrade the core servers to Windows Server 2012 R2 and observed that static IPv6 addresses set using PowerShell would not

11 persist across reboots. The issue was first noticed in mockup and caused considerable consternation since the same commands worked flawlessly in Windows Server Documentation could not be found indicating a different approach was needed. The problem was eventually traced to a design change that required the DHCP setting in the network adapter interface to be disabled manually. This was in contrast to the prior operating system version that made the change automatically. Finally, it is important to continually review network configurations to ensure they are protocol independent. For example, converting a setting that contains a physical IP address to a resolvable, fully qualified domain name (FQDN) eliminates dependence on whether IPv4 or IPv6 is being used. Sometimes these settings are not always apparent as the author recently discovered. For instance, routing web traffic through a proxy server entails setting a field called Address in the Internet Explorer control panel. The term Address suggests that a physical address is needed. After some trial and error to determine if a named resource would work, it was learned that a FQDN will satisfy address requirements for that field thus allowing protocol independence. 5 Closing Observations Overall, deployment of the IPv4-IPv6 dual-stack network in the department s computing infrastructure went smoothly and suffered no major setbacks. It is the author s opinion that being able to practice and experiment with IPv6 technologies prior to the actual deployment contributed greatly to the success of the rollout. Using desktop virtualization software and an IPv6 connection via tunnel broker enabled the author to build and test mockups and trial configurations well in advance of the actual implementation. The challenge of integrating meaningful and relevant IPv6 projects into existing courses is the next step now that the IPv4-IPv6 dual stack network is in place. A natural starting point is to extend existing IPv4 setups into the IPv6 domain and take advantage of the similarities between protocols. Having the ability to compare IPv4 and IPv6 protocols and deployment methods offers the ability to highlight advancements made in the IPv6 protocol and leverage IPv6 technology in the classroom. In closing, this paper presented the process of deploying IPv6 technology in an academic computing environment to provide students and faculty with the tools to extend textbook concepts to the world of practice. Topics discussed included the challenges of deploying IPv6 technology, curricular implications, design considerations, implementation, and migration of the existing systems. A variety of design alternatives were presented to stimulate discussion and encourage academic departments to consider incorporating IPv6 technology in their curriculum.

12 References [1] Czyz, J., Allman, M., Zhang, J., Lekel-Johnson, S., Osterweil, E., and Bailey, M., Measuring IPv6 Adoption (2014). ACM SIGCOMM 14, August 17-22, Chicago, IL, USA, pp [2] ICANN urges IPv6 adoption as global address shortage looms (2014). ZDNet, [3] Smart cities will house 9.7 billion IoT devices by 2020: Gartner (2015). ZDNet, gartner/. [4] Deprecating Anycast Prefix for 6to4 Relay Routers draft-ietf-v6ops-6to4-to-historic- 11 (2015). IETF, [5] Using DNS servers with DHCP (2005). Microsoft, [6] The Dynamic Host Configuration Protocol (DHCP) Client Fully Qualified Domain Name (FQDN) Option RFC 4702 (2006). IETF,

Basic IPv6 WAN and LAN Configuration

Basic IPv6 WAN and LAN Configuration Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

Industry Automation White Paper Januar 2013 IPv6 in automation technology

Industry Automation White Paper Januar 2013 IPv6 in automation technology Table of contents: 1 Why another White Paper IPv6?... 3 2 IPv6 for automation technology... 3 3 Basics of IPv6... 3 3.1 Turning point/initial situation... 3 3.2 Standardization... 4 3.2.1 IPv6 address

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

Implementing DHCPv6 on an IPv6 network

Implementing DHCPv6 on an IPv6 network Implementing DHCPv6 on an IPv6 network Benjamin Long benlong@iol.unh.edu 8-11-2009 Implementing DHCPv6 on an IPv6 network 2 Table of Contents DHCPv6 Overview...3 Terms used by DHCPv6...3 DHCPv6 Message

More information

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Step-by-Step Guide for Setting Up IPv6 in a Test Lab Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6

More information

CIRA s experience in deploying IPv6

CIRA s experience in deploying IPv6 CIRA s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, 2011 1 About CIRA The Registry that operates the Country

More information

IPv6 Addressing. Awareness Objective. IPv6 Address Format & Basic Rules. Understanding the IPv6 Address Components

IPv6 Addressing. Awareness Objective. IPv6 Address Format & Basic Rules. Understanding the IPv6 Address Components IPv6 Addressing Awareness Objective IPv6 Address Format & Basic Rules Understanding the IPv6 Address Components Understanding & Identifying Various Types of IPv6 Addresses 1 IPv4 Address SYNTAX W. X.

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

IPv6 Integration in Federal Government: Adopt a Phased Approach for Minimal Disruption and Earlier Benefits

IPv6 Integration in Federal Government: Adopt a Phased Approach for Minimal Disruption and Earlier Benefits IPv6 Integration in Federal Government: Adopt a Phased Approach for Minimal Disruption and Earlier Benefits Abstract U.S. federal government agencies are required to integrate IPv6 into their network infrastructures,

More information

IPv6 Transition Work in the IETF

IPv6 Transition Work in the IETF IPv6 Transition Work in the IETF Ralph Droms, Internet Area Director Thanks to Jari Arkko, Fred Baker and many others for contributions to these slides 1 IPv6 Transition Work in the IETF Outline of Presentation

More information

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation Agenda The Opportunity Key Problems The Promise of IPv6 What is Microsoft doing Call to Action

More information

IPv6 Fundamentals: A Straightforward Approach

IPv6 Fundamentals: A Straightforward Approach IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background

More information

Residential IPv6 IPv6 a t at S wisscom Swisscom a, n an overview overview Martin Gysi

Residential IPv6 IPv6 a t at S wisscom Swisscom a, n an overview overview Martin Gysi Residential IPv6 at Swisscom, an overview Martin Gysi What is Required for an IPv6 Internet Access Service? ADSL L2 platform, IPv6 not required VDSL Complex Infrastructure is Barrier to Cost-efficient

More information

IPv6 Tunneling Over IPV4

IPv6 Tunneling Over IPV4 www.ijcsi.org 599 IPv6 Tunneling Over IPV4 A.Sankara Narayanan 1, M.Syed Khaja Mohideen 2, M.Chithik Raja 3 Department of Information Technology Salalah College of Technology Sultanate of Oman ABSTRACT

More information

Virtualization in the Academic Computing Infrastructure: The Rise of Boutique Computing

Virtualization in the Academic Computing Infrastructure: The Rise of Boutique Computing Virtualization in the Academic Computing Infrastructure: The Rise of Boutique Computing Shaun M. Lynch, Ph.D. Department of Mathematics and Computer Science University of Wisconsin-Superior Superior, WI

More information

Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing

Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing White Paper Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing What You Will Learn With the exhaustion of IPv4 addresses, businesses and government agencies

More information

Firewalls und IPv6 worauf Sie achten müssen!

Firewalls und IPv6 worauf Sie achten müssen! Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG pascal.raemy@asecus.ch Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

IPv6 in Axis Video Products

IPv6 in Axis Video Products TECHNICAL NOTE REFERENCE DOCUMENT IPv6 in Axis Video Products Created: 2006-01-31 Last updated: 2006-05-29 TABLE OF CONTENTS DOCUMENT HISTORY... 2 1 IPV6 IN GENERAL... 3 1.1 The IPv6 address... 3 1.1.1

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

TR-296 IPv6 Transition Mechanisms Test Plan

TR-296 IPv6 Transition Mechanisms Test Plan Technical Report TR-296 IPv6 Transition Mechanisms Test Plan Issue:1 Issue Date: November 2013 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Configuring Windows Server 2008 Network Infrastructure

Configuring Windows Server 2008 Network Infrastructure Configuring Windows Server 2008 Network Infrastructure Course Number: 70-642 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-642: TS: Windows Server

More information

Linux as an IPv6 dual stack Firewall

Linux as an IPv6 dual stack Firewall Linux as an IPv6 dual stack Firewall Presented By: Stuart Sheldon stu@actusa.net http://www.actusa.net http://www.stuartsheldon.org IPv6 2001:0DB8:0000:0000:021C:C0FF:FEE2:888A Address format: Eight 16

More information

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces

More information

Discovering IPv6 with Wireshark. presented by Rolf Leutert

Discovering IPv6 with Wireshark. presented by Rolf Leutert Discovering IPv6 with Wireshark presented by Rolf Leutert Instructor: Rolf Leutert, Network Expert & Trainer Leutert NetServices Troubleshooting & Trainings Zürich-Airport, Switzerland Sniffer certified

More information

Interconnecting IPv6 Domains Using Tunnels

Interconnecting IPv6 Domains Using Tunnels Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Planning the transition to IPv6

Planning the transition to IPv6 Planning the transition to IPv6 An Allstream White Paper 1 Table of contents Why transition now? 1 Transition mechanisms 2 Transition phases 2 IPv6 transition challenges 3 Taking advantage of IPv6 benefits

More information

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier

More information

Exam : 070-642 Title : TS: Windows Server 2008 Network Infrastructure, Configuring Ver : 08-13-2008

Exam : 070-642 Title : TS: Windows Server 2008 Network Infrastructure, Configuring Ver : 08-13-2008 Exam : 070-642 Title : TS: Windows Server 2008 Network Infrastructure, Configuring Ver : 08-13-2008 QUESTION 1: Certkiller.com has an IPv6 network which has 25 segments. As an administrator, you deploy

More information

IPV6 DEPLOYMENT GUIDELINES FOR. ARRIS Group, Inc.

IPV6 DEPLOYMENT GUIDELINES FOR. ARRIS Group, Inc. IPV6 DEPLOYMENT GUIDELINES FOR CABLE OPERATORS Patricio i S. Latini i ARRIS Group, Inc. Current IPv4 Situationti IANA has already assigned the last IPv4 Blocks to the RIRs. RIRs address exhaustion may

More information

THE ADOPTION OF IPv6 *

THE ADOPTION OF IPv6 * THE ADOPTION OF IPv6 * STUDENT PAPER Brian Childress Southwest Texas State University BC56075@swt.edu Bryan Cathey Southwest Texas State University BC1033@swt.edu Sara Dixon Southwest Texas State University

More information

IPv6 Deployment Strategies

IPv6 Deployment Strategies Version History Version Number Date Notes 1 10/15/2001 This document was created. 2 11/13/2001 Update to the explanation of NAT along tunnel paths. 3 03/08/2002 Update to the Related Documents section.

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

Whitepaper IPv6. OpenScape UC Suite IPv6 Transition Strategy

Whitepaper IPv6. OpenScape UC Suite IPv6 Transition Strategy Whitepaper IPv6 OpenScape UC Suite IPv6 Transition Strategy Table of Contents 1. Executive Summary 3 2. Introduction 4 3. Technical Basics 5 3.1. IPv4 IPv6 Translation 6 3.2. IP-in-IP Tunneling 7 4. Selecting

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

IPv6 en Windows. Juan Jackson Pablo García

IPv6 en Windows. Juan Jackson Pablo García IPv6 en Windows Ignacio Cattivelli Juan Jackson Pablo García Dual lstack Architecture t Application Layer TCP/UDP TCP/UDP Tcpip6.sys Tcpip.sys IPv6 IPv4 Network Interface Layer In Windows XP and Windows

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

SANS Technology Institute Group Discussion/Written Project. The Rapid Implementation of IPv6 at GIAC Enterprises

SANS Technology Institute Group Discussion/Written Project. The Rapid Implementation of IPv6 at GIAC Enterprises SANS Technology Institute Group Discussion/Written Project The Rapid Implementation of IPv6 at GIAC Enterprises 12/9/2010 Stacy Jordan Beth Binde Glen Roberts Table of Contents Executive Summary 3 Background

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms

Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms I-Ping Hsieh Shang-Juh Kao Department of Computer Science National Chung-Hsing University 250 Kuo-Kuang Rd., Taichung,

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Document ID: 45741. Introduction

Document ID: 45741. Introduction Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4

More information

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)

More information

Networking with Windows Server vb. Day(s): 5. Version: Overview

Networking with Windows Server vb. Day(s): 5. Version: Overview Networking with Windows Server vb Day(s): 5 Course Code: M10970 Version: B Overview Get hands-on instruction and practice implementing networking with Windows Server 2012 and Windows Server 2012 R2 in

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

70-642 R4: Configuring Windows Server 2008 Network Infrastructure

70-642 R4: Configuring Windows Server 2008 Network Infrastructure 70-642 R4: Configuring Windows Server 2008 Network Infrastructure Course Introduction Chapter 01 - Understanding and Configuring IP Lesson: Introducing the OSI Model Understanding the Network Layers OSI

More information

Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011

Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011 Joe Davies Principal Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group June 1, 2011 2011 Microsoft Corporation IPv6 addressing and DNS review IPv6 subnetting

More information

Types of IPv4 addresses in Internet

Types of IPv4 addresses in Internet Types of IPv4 addresses in Internet PA (Provider Aggregatable): Blocks of addresses that may be sub-assigned to other ISPs or to other companies that also may leased the addresses to their customers May

More information

IPv6 Autoconfiguration Best Practice Document

IPv6 Autoconfiguration Best Practice Document IPv6 Autoconfiguration Best Practice Document Produced by the CESNET-led working group on IPv6 (CBPD117) Authors: Tomáš Podermański, Matěj Grégr August 2011 Original version 2011 English translation TERENA

More information

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2. Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

About Me. Work at Jumping Bean. Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa mark@jumpingbean.co.za

About Me. Work at Jumping Bean. Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa mark@jumpingbean.co.za IPv6 & Linux About Me Work at Jumping Bean Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa mark@jumpingbean.co.za Goals & Motivation Why? Why IPv6? Why this talk? Information on

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Securing the Transition Mechanisms

Securing the Transition Mechanisms Securing the Transition Mechanisms CRC/ITU/APNIC IPv6 Security Workshop 29 th June 1 st July 2015 Ulaanbaatar Last updated 13 July 2014 1 Where did we leave off? p We ve just covered the current strategies

More information

WHITE PAPER. Best Practices for Deploying IPv6 over Broadband Access

WHITE PAPER. Best Practices for Deploying IPv6 over Broadband Access WHITE PAPER Best Practices for Deploying IPv6 over Broadband Access www.ixiacom.com 915-0123-01 Rev. C, December 2013 2 Table of Contents Udi cusciamenis minctorpos... 4 Toreptur aut dolo cone verum aute

More information

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Appendix D: Configuring Firewalls and Network Address Translation

Appendix D: Configuring Firewalls and Network Address Translation Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.

More information

Developing an IPv6 Addressing Plan Guidelines, Rules, Best Practice

Developing an IPv6 Addressing Plan Guidelines, Rules, Best Practice Developing an IPv6 Addressing Plan Guidelines, Rules, Best Practice Ron Broersma DREN Chief Engineer SPAWAR Network Security Manager ron@spawar.navy.mil Introduction IPv6 deployment includes: obtaining

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Windows 7 Resource Kit

Windows 7 Resource Kit Windows 7 Resource Kit Mitch Tulloch, Tony Northrup, and Jerry Honeycutt To learn more about this book, visit Microsoft Learning at http://www.microsoft.com/mspress/books/ 9780735627000 2009 Microsoft

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

IPv6 for AT&T Broadband

IPv6 for AT&T Broadband IPv6 for AT&T Broadband Chris Chase, AT&T Labs Sept 15, 2011 AT&T Broadband ~15 million subscribers Legacy DSL, PPP subscribers, ATM aggregation Not many CPE IPv6 capable Customer owned, unmanaged CPE

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Niagara IT Manager s Guide

Niagara IT Manager s Guide 3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common

More information

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence

More information

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know WHITE PAPER Understanding IP Addressing: Everything You Ever Wanted To Know Understanding IP Addressing: Everything You Ever Wanted To Know CONTENTS Internet Scaling Problems 1 Classful IP Addressing 3

More information

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world

More information

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component

More information

Internet Addresses (You should read Chapter 4 in Forouzan)

Internet Addresses (You should read Chapter 4 in Forouzan) Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment

More information

IPv6 Fundamentals, Design, and Deployment

IPv6 Fundamentals, Design, and Deployment IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Chapter 19 Network Layer: Logical Addressing 19.1

Chapter 19 Network Layer: Logical Addressing 19.1 Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that

More information

Use Domain Name System and IP Version 6

Use Domain Name System and IP Version 6 Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)

More information

IEEE GLOBECOM 2009 Deploying IPv6 at AT&T

IEEE GLOBECOM 2009 Deploying IPv6 at AT&T IEEE GLOBECOM 2009 Deploying IPv6 at AT&T Simon Zelingher Vice President - Global Optical, IP & Data Development AT&T Labs 2009 AT&T Intellectual Property, Inc. All rights reserved Outline Drivers for

More information

Deploying IPv6 Service Across Local IPv4 Access Networks

Deploying IPv6 Service Across Local IPv4 Access Networks Deploying IPv6 Service Across Local IPv4 Access Networks ALA HAMARSHEH 1, MARNIX GOOSSENS 1, RAFE ALASEM 2 1 Vrije Universiteit Brussel Department of Electronics and Informatics ETRO Building K, Office

More information

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP

More information

IPv4/IPv6 Transition Mechanisms. Luka Koršič, Matjaž Straus Istenič

IPv4/IPv6 Transition Mechanisms. Luka Koršič, Matjaž Straus Istenič IPv4/IPv6 Transition Mechanisms Luka Koršič, Matjaž Straus Istenič IPv4/IPv6 Migration Both versions exist today simultaneously Dual-stack IPv4 and IPv6 protocol stack Address translation NAT44, LSN, NAT64

More information

MCSE. 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724

MCSE. 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 COURSE SYLLABUS MCSE Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-293) Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure

More information

NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1.

NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1. Course 20410C: Installing and Configuring Windows Server 2012 OVERVIEW About this Course Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012

More information

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com 1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and

More information

2015 Spring Technical Forum Proceedings

2015 Spring Technical Forum Proceedings Virtualizing the Home Network Michael Kloberdans CableLabs Abstract One of the areas of focus in the Cable industry has been a virtualized home network. This paper proposes a road map with an analysis

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION

VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION TECHNICAL MARKETING DOCUMENTATION October 2014 Table of Contents Purpose and Overview.... 3 1.1 Background............................................................... 3 1.2 Target Audience...........................................................

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

communications : IPv6 transition plans

communications : IPv6 transition plans Alcatel-Lucent Enterprise IP communications : transition plans Application Note Table of contents Introduction / 1 The promises of / 1 The exhaustion is becoming real in the Internet / 1 The adoption drivers

More information

Configuring IP Addressing and Services

Configuring IP Addressing and Services Configuring IP Addressing and Services 2 Chapter 1 Configuring IP Addressing and Services 1. Your organization consists of a single Windows Server 2008 Active Directory domain that is spread across two

More information

Campus IPv6 connection Campus IPv6 deployment

Campus IPv6 connection Campus IPv6 deployment Campus IPv6 connection Campus IPv6 deployment Campus Address allocation, Topology Issues János Mohácsi NIIF/HUNGARNET Copy Rights This slide set is the ownership of the 6DISS project via its partners The

More information

Charter Text Network Design and Configuration

Charter Text Network Design and Configuration MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for

More information

Horizontal Integration - Unlocking the Cloud Stack. A Technical White Paper by FusionLayer, Inc.

Horizontal Integration - Unlocking the Cloud Stack. A Technical White Paper by FusionLayer, Inc. Horizontal Integration - Unlocking the Cloud Stack A Technical White Paper by FusionLayer, Inc. August 2013 Copyright 2015 FusionLayer, Inc. All rights reserved. No part of this publication may be reproduced,

More information